. 2020.07.17 00:33:44 - Above log line repeated 1 times more . 2020.07.17 00:33:44 - OpenVPN > TLS: soft reset sec=0 bytes=10466748560/-1 pkts=15115342/0 . 2020.07.17 00:33:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.17 00:33:44 - OpenVPN > VERIFY KU OK . 2020.07.17 00:33:44 - OpenVPN > Validating certificate extended key usage . 2020.07.17 00:33:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.17 00:33:44 - OpenVPN > VERIFY EKU OK . 2020.07.17 00:33:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.17 00:33:45 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.17 00:33:45 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.17 00:33:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.17 00:50:13 - Collect information about AirVPN completed . 2020.07.17 01:33:44 - Above log line repeated 1 times more . 2020.07.17 01:33:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.17 01:33:44 - OpenVPN > VERIFY KU OK . 2020.07.17 01:33:44 - OpenVPN > Validating certificate extended key usage . 2020.07.17 01:33:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.17 01:33:44 - OpenVPN > VERIFY EKU OK . 2020.07.17 01:33:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.17 01:33:44 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.17 01:33:44 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.17 01:33:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.17 01:50:14 - Collect information about AirVPN completed . 2020.07.17 02:33:44 - Above log line repeated 1 times more . 2020.07.17 02:33:44 - OpenVPN > TLS: soft reset sec=0 bytes=12197755/-1 pkts=53264/0 . 2020.07.17 02:33:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.17 02:33:44 - OpenVPN > VERIFY KU OK . 2020.07.17 02:33:44 - OpenVPN > Validating certificate extended key usage . 2020.07.17 02:33:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.17 02:33:44 - OpenVPN > VERIFY EKU OK . 2020.07.17 02:33:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.17 02:33:44 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.17 02:33:44 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.17 02:33:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.17 02:50:19 - Collect information about AirVPN completed . 2020.07.17 03:33:44 - Above log line repeated 1 times more . 2020.07.17 03:33:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.17 03:33:44 - OpenVPN > VERIFY KU OK . 2020.07.17 03:33:44 - OpenVPN > Validating certificate extended key usage . 2020.07.17 03:33:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.17 03:33:44 - OpenVPN > VERIFY EKU OK . 2020.07.17 03:33:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.17 03:33:44 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.17 03:33:44 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.17 03:33:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.17 03:50:25 - Collect information about AirVPN completed . 2020.07.17 04:33:44 - Above log line repeated 1 times more . 2020.07.17 04:33:44 - OpenVPN > TLS: soft reset sec=0 bytes=10018114/-1 pkts=41070/0 . 2020.07.17 04:33:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.17 04:33:44 - OpenVPN > VERIFY KU OK . 2020.07.17 04:33:44 - OpenVPN > Validating certificate extended key usage . 2020.07.17 04:33:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.17 04:33:44 - OpenVPN > VERIFY EKU OK . 2020.07.17 04:33:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.17 04:33:44 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.17 04:33:44 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.17 04:33:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.17 04:50:26 - Collect information about AirVPN completed . 2020.07.17 05:33:44 - Above log line repeated 1 times more . 2020.07.17 05:33:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.17 05:33:44 - OpenVPN > VERIFY KU OK . 2020.07.17 05:33:44 - OpenVPN > Validating certificate extended key usage . 2020.07.17 05:33:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.17 05:33:44 - OpenVPN > VERIFY EKU OK . 2020.07.17 05:33:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.17 05:33:44 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.17 05:33:44 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.17 05:33:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.17 05:50:29 - Collect information about AirVPN completed . 2020.07.17 06:33:44 - Above log line repeated 1 times more . 2020.07.17 06:33:44 - OpenVPN > TLS: soft reset sec=0 bytes=15283356/-1 pkts=61353/0 . 2020.07.17 06:33:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.17 06:33:44 - OpenVPN > VERIFY KU OK . 2020.07.17 06:33:44 - OpenVPN > Validating certificate extended key usage . 2020.07.17 06:33:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.17 06:33:44 - OpenVPN > VERIFY EKU OK . 2020.07.17 06:33:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.17 06:33:44 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.17 06:33:44 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.17 06:33:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.17 06:50:30 - Collect information about AirVPN completed . 2020.07.17 07:33:44 - Above log line repeated 1 times more . 2020.07.17 07:33:44 - OpenVPN > TLS: soft reset sec=0 bytes=17456922/-1 pkts=70808/0 . 2020.07.17 07:33:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.17 07:33:44 - OpenVPN > VERIFY KU OK . 2020.07.17 07:33:44 - OpenVPN > Validating certificate extended key usage . 2020.07.17 07:33:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.17 07:33:44 - OpenVPN > VERIFY EKU OK . 2020.07.17 07:33:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.17 07:33:45 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.17 07:33:45 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.17 07:33:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.17 07:50:33 - Collect information about AirVPN completed . 2020.07.17 08:33:44 - Above log line repeated 1 times more . 2020.07.17 08:33:44 - Renewing TLS key . 2020.07.17 08:33:44 - OpenVPN > TLS: tls_process: killed expiring key . 2020.07.17 08:33:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.17 08:33:44 - OpenVPN > VERIFY KU OK . 2020.07.17 08:33:44 - OpenVPN > Validating certificate extended key usage . 2020.07.17 08:33:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.17 08:33:44 - OpenVPN > VERIFY EKU OK . 2020.07.17 08:33:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.17 08:33:45 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.17 08:33:45 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.17 08:33:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.17 08:50:38 - Collect information about AirVPN completed